Diana Kelley

Diana Kelley

Rye, New Hampshire, United States
16K followers 500+ connections

About

Diana Kelley is the Chief Information Security Officer (CISO) for Protect AI. She also…

Courses by Diana

Activity

Experience

  • Protect AI Graphic
  • -

  • -

  • -

  • -

    San Francisco, California, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Global

  • -

    Global

  • -

    Remote Worker

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

Publications

  • Cryptographic Libraries for Developers

    Charles River Media Programming

    Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it…

    Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly. Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements. The book serves as a nuts and bolts guide to writing software using these libraries and provides abundant examples and detailed examples throughout. The libraries covered include OpenSSL, B/Safe, the Java Cryptographic Library (JCE,) as sign/verify, encrypt/decrypt (asymmetric and symmetric,) MACs, and Hashing, as well as higher-level primitives such as X.509 digital certificates and secure (SSL) communications.

    Other authors
    See publication

Projects

  • Writing

    - Present

    Research reports, blog posts and articles on security industry topics including risk management, compliance and security integration and implementation.

    Other creators
    See project
  • Speaking

    - Present

    •MISTI ITAC, 2013, 2015
    •InfoSec World, 2000, 2001, 2003, 2004, 2005, 2008, 2010, 2011, 2012, 2015 (*Advisory Board)
    •Cloud Security World, 2015
    •One2One Conference, 2014* (*Keynote)
    •CyberSecurity Symposium – Securing the Internet of Things, 2014
    •ISSA Rochester, 9th Annual Security Summit, 2014
    •Raleigh Triangle InfoSeCon, 2014
    •2nd Annual ITA Internet of Things Summit, 2014
    •CISO Executive Network, 2013, 2014
    •ISSA/IANS Data Security in the Cloud Symposium…

    •MISTI ITAC, 2013, 2015
    •InfoSec World, 2000, 2001, 2003, 2004, 2005, 2008, 2010, 2011, 2012, 2015 (*Advisory Board)
    •Cloud Security World, 2015
    •One2One Conference, 2014* (*Keynote)
    •CyberSecurity Symposium – Securing the Internet of Things, 2014
    •ISSA Rochester, 9th Annual Security Summit, 2014
    •Raleigh Triangle InfoSeCon, 2014
    •2nd Annual ITA Internet of Things Summit, 2014
    •CISO Executive Network, 2013, 2014
    •ISSA/IANS Data Security in the Cloud Symposium, 2014
    •ISSA Los Angeles Security Summit, 2014
    •ISACA Mobile Security Webinar, 2014
    •IANS Los Angeles Information Security Forum, 2013, 2014
    •IANS Midwest Information Security Forum, 2011, 2012, 2014
    •IANS Philadelphia Information Security Forum, 2011, 2012, 2014
    •IANS Mid-Atlantic Information Security Forum, 2012, 2013, 2014
    •ISSA Women in Security Webinar, 2014
    •Executive Women’s Forum, 2003*, 2004*, 2013, 2014** (*Advisory Board Member, **Content Advisory Board)
    •2nd Annual Cyber Security for Energy and Utilities, 2013* (*Keynote)
    •MISTI Mobile & Smart Device Security, 2011*, 2012*, 2013* (*Conference Chair)
    •IANS Northeast Information Security Forum, 2011, 2012, 2013
    •IANS New York Metro Information Security Forum, 2011, 2012, 2013
    •IANS Lone Star Information Security Forum, 2012, 2013* (*Keynote)
    •BrightTalk, Mobile Apps, 2013
    •IANS Pacific Information Security Forum, 2012
    •IANS Midwest Information Security Forum, 2011, 2012
    •Information Security Decisions, 2008, 2009, 2012
    •Canadian Bankers Association, 2012
    •ComDex 2000, 2003, 2010, 2011
    •SearchSecurity PCI DSS 2.0, 2011
    •Financial Information Security Decisions, 2008, 2011
    •TechTarget PCI Seminar, 2008, 2009
    •MISTI Virtualization Summit, Conference Chair, 2007
    •FinSec, 2007, 2008
    •American Petroleum Institute Security Conference, 2007
    •Burton Group Catalyst North America, 2004, 2005, 2006, 2007
    •Burton Group Catalyst, Europe, 2005, 2006, 2007
    •The Conference on Identity Management, Conference Chair 2006

    Other creators
    See project

Languages

  • French

    -

Recommendations received

19 people have recommended Diana

Join now to view

View Diana’s full profile

  • See who you know in common
  • Get introduced
  • Contact Diana directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Diana Kelley in United States

Add new skills with these courses